CVE-2020-5284
MEDIUM EXPLOITED NUCLEIZeit Next.js < 9.3.2 - Path Traversal
Title source: ruleDescription
Next.js versions before 9.3.2 have a directory traversal vulnerability. Attackers could craft special requests to access files in the dist directory (.next). This does not affect files outside of the dist directory (.next). In general, the dist directory only holds build assets unless your application intentionally stores other assets under this directory. This issue is fixed in version 9.3.2.
Nuclei Templates (1)
Next.js <9.3.2 - Local File Inclusion
MEDIUMby rootxharsh,iamnoooob,dwisiswant0
Shodan:
http.html:"/_next/static" || cpe:"cpe:2.3:a:zeit:next.js"
FOFA:
body="/_next/static"
Scores
CVSS v3
4.4
EPSS
0.8321
EPSS Percentile
99.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N
Details
VulnCheck KEV
2026-03-23
CWE
CWE-22
CWE-23
Status
published
Products (2)
npm/next
0.9.9 - 9.3.2npm
zeit/next.js
< 9.3.2
Published
Mar 30, 2020
Tracked Since
Feb 18, 2026